You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: kustomize/certmanager/README.md
+10-5Lines changed: 10 additions & 5 deletions
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
# Using Cert-Manager with Postgres Operator 5.x
2
2
3
3
## Introduction
4
-
Starting with version 5.0 of the Crunchy Data Postgres Operator for Kubernetes, TLS is on by default to secure all communication to/from the postgres cluster. By default, the Operator will generate the necessary certificates for the Postgres cluster and components. It is possible to provide custom cetificates by storing the certificates in a Kubernetes Secret and pointing the Operator to those secrets in the Postgres manifest.
4
+
Starting with version 5.0 of PGO, the Postgres Operator from Crunchy Data, TLS is on by default to secure all communication to/from the postgres cluster. By default, the Operator will generate the necessary certificates for the Postgres cluster and components. It is possible to provide custom certificates by storing the certificates in a Kubernetes Secret and pointing the Operator to those secrets in the Postgres manifest.
5
5
6
6
Cert-Manager can be used to dynamically generate and manage certificates in Kubernetes. Cert-Manager can generate self-signed certificates or certificates from several certificate authorities.
7
7
@@ -14,7 +14,10 @@ The first step is to deploy Cert-Manager to the Kubernetes cluster. To do this,
14
14
After Cert-Manager has been deployed, the next step used in this example is to setup a Certificate Issuer. The Certificate Issuer can be configured to be local to a namespace or cluster wide. In the examples provided here, a cluster wide issuer is created.
15
15
16
16
### Configure Issuer
17
-
```kubectl apply -k certman```
17
+
18
+
```
19
+
kubectl apply -k certman
20
+
```
18
21
19
22
This Kustomize deployment performs the following actions:
20
23
@@ -34,11 +37,13 @@ Two certificates will be generated by the Kustomize deployment. The first certi
34
37
35
38
In the Postgres manifest, two entries are added to point to the newly created Secrets. The customTLSSecret key references the <cluster>-tls secret while the customReplicationTLSSecret references the <cluster>-repl-tls secret.
36
39
37
-
### Deploy Postgres Cluster
38
-
```kubectl apply -k postgres```
40
+
### Deploy Postgres
41
+
42
+
```shell
43
+
kubectl apply -k postgres
44
+
```
39
45
40
46
The following process takes place during the deployment:
41
47
* Custom certificate is generated for Postgres using the CA ClusterIssuer created in the previous steps.
42
48
* Custom certificate is generated for Postgres replication using the CA ClusterIssuer.
43
49
* Postgres cluster deployed using the custom certificates.
0 commit comments